Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Ethical Hackers & Bug Bounty: Our Security Journey #applicationsecurity #cybersecurity

Mend.io, formerly known as Whitesource, has over a decade of experience helping global organizations build world-class AppSec programs that reduce risk and accelerate development -– using tools built into the technologies that software and security teams already love. Our automated technology protects organizations from supply chain and malicious package attacks, vulnerabilities in open source and custom code, and open-source license risks.

Hackers REVEALED: The TRUTH About Bug Bounty Programs #cybersecurity #bugbounty

Mend.io, formerly known as Whitesource, has over a decade of experience helping global organizations build world-class AppSec programs that reduce risk and accelerate development -– using tools built into the technologies that software and security teams already love. Our automated technology protects organizations from supply chain and malicious package attacks, vulnerabilities in open source and custom code, and open-source license risks.

SolarWinds Hack: How State Actors Infiltrated & What You Can Learn #cybersecurity #solarwinds

State actors played the long game by targeting SolarWinds’ build server, injecting malicious code without detection. Learn why code diffs, hash checks, and decompiling builds are critical for cybersecurity today.

The Rise of Vulnerability Exploits: Why Hackers Are Moving Beyond Phishing

The 2025 edition of Verizon’s Data Breach Investigations Report (DBIR) shows a new reality: about one in five confirmed breaches now starts with exploitation of a software vulnerability, a 34 percent jump over the previous year and the first time the vector has surpassed phishing.

Homograph attacks: How hackers exploit look-alike domains

Several years ago, a security researcher discovered a vulnerability in Google Chrome that allowed fake domains to bypass the browser’s security measures. The researcher registered a domain that appeared as “xn--80ak6aa92e.com” but displayed as “apple.com” in the browser, demonstrating how easy it was to deceive users. This is just one example of what’s known as a homograph attack, or sometimes a ‘look-a-like domain’.

Can End-to-End Encryption Be Hacked?

We have become so reliant on communicating on the Internet that sometimes we need to take a minute to consider how our data is being protected and whether what we send on the Internet is truly safe. While end-to-end encryption has become integral to protecting our data online, you may be thinking, can end-to-end encryption be hacked?

Malware hiding in plain sight: Spying on North Korean Hackers

On March 13th 2025, our malware analysis engine alerted us to a potential malicious package that was added to NPM. First indications suggested this would be a clear-cut case, however, when we started peeling back the layers things weren’t quite as they seemed. Here is a story about how sophisticated nation state actors can hide malware within packages.

Ep 4: Naming and Shaming

As Chinese hackers continue their raid of American companies, the threat reaches new levels of urgency, not so much for the sophistication of these hackers, but because of the sheer volume of attacks. And yet, victims continue to keep their breaches under wraps, and the government is hamstrung in what they can say because most everything they know about Chinese cyberespionage is classified.